Risks in Cyber Crime, Cyber Terrorism and Warfare, Cyber Threats …What You Need to Know
The objective of this seminar is to provide practical and immediately usable information to professionals on how to protect both data and infrastructure from the ravages of electronic terrorism and associated cyber crimes. Once only a topic for made-for-television thrillers, cyber terrorism has captured global front page headlines and reported top news stories from every facet of commerce. Individuals engaged in international, industrial espionage, organized crime, competitive intelligence gathering, political warfare, and destruction of critical infrastructure pose a threat to governments, organizations and citizens alike.
This seminar is designed to provide the attendee with a fresh examination of the inherent risks associated with individuals or groups, who use cyberspace to threaten international governments, interfere with domestic operations, terrorize the citizens of a country, and attempt to disrupt corporate operations and how to minimize exposure to these risks.
After completing this seminar, participants will:
• Recognize and identify the differences between cyber crimes, cyber warfare, cyber terrorism and cyber threats.
• Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces.
• Understand the basic principles and philosophies of cyber terrorism and how individuals and corporations can be targeted.
• Identify existing exposures and weaknesses within their organization's operations, which would make the organization an easy target for cyber terrorists.
• Be prepared to assist their organization in securing its operations, minimizing its security exposure, and mitigating the possibility of becoming the victim of a cyber-based attack.
This session is offered at the following upcoming Training Events:
Not yet scheduled
This seminar is intended for Chief Security Officers, Chief Technology Officers, Chief Information Officers, Controllers and their management, internal and external audit professionals, InfoSec and law enforcement professionals, system analysts, decision makers who need a thorough understanding of the cyber threats facing 21st century organizations, and individuals who wish to learn more about controlling and hardening their organization's environment against cyber-attacks.
There is no prerequisite for this seminar.
Investigating Cyber Threats
• What does history tell us?
• What’s at risk?
• Who is at risk?
• What are the key weaknesses?
• Identifying key threats
• Analysis of the surveys, what do the numbers say?
• What does the future look like?
What is Cyber Crime?
• ID Fraud
• Medical Fraud
• Critical National Infrastructures
Vital Human Services
• Examples of Cyber Crimes
• Information as a Resource?
Exercise #1 Where the Wild Things Are
The Reality of Cyber-Terrorism
• Shifting Priorities and Public Services The Affect of Terrorism
• Risk of Major Cyber Attacks
• Factors Point Toward Significant Super Terrorism in 21st Century
Portrait of a Cyber Terrorist
• Risk Management Model
• Cyber Threats
Common Security Problems Plaguing the Internet
• Some All-to-Common Internet Attack Methods
Terrorist’s Tools and Techniques
• The Cyber-Terrorist's Traditional Weapons of Choice
Mitigating the Terrorist Threat
• Incident Handling Life Cycle
• Key Controls to Mitigating Cyber Terror Attacks
• Safeguarding Computer Networks
• Cyber Security Recommendations
• Suggested Smart Practices
Exercise #2 Cyber Extortion Case
International Cyber Terrorism: a Global Concern
• Infrastructure Evolution
• Potential Targets of Cyber-Terrorism
• Common Security Threats
• Attack Sophistication vs. Intruder Technical Knowledge
• Vulnerability Exploit Cycle
• How Could You Take Down Most of the Internet?
Examining Cyber Warfare
• What’s Next????
Using a Network Analyzer as a Security Tool
Retrospective Network Analysis
• Uncovering Digital Evidence
• Network Security Forensics
IT Tools -- Achieving Greater Security through Technology Solutions
• Monitoring Network Activity - Network Instruments – Observer
• Vulnerability Management - PatchLink Security Management Console 6.4
• Regulatory Compliance – Liquid Machines
• E-mail Threats – Arcmail Solutions
• Securing Corporate Communications - Ironport
Exercise #3 Developing a Cyber Attack Response Plan